SSTI leads to Command injection
None
Vulnerability Details
## Summary:
Hi ,team
i 'am new reasercher search for pleasure excuse me for poor technical details.
the parmeter os is vulnerable to SSTI leads to command injection
## Affected version
curl/7.55.1
## Steps To Reproduce:
i tried to injected the os parmeter
```
curl -os{popen('sleep 10').read()} --url gyvgzienwleealjmudejwl83p3p29bxi9.oast.fun
```
the reponse error:
```
curl: (3) [globbing] unmatched close brace/bracket in column 12
```
for honesty i used gemni to inject command
```
curl -os{system("sleep 10")}.read --url gyvgzienwleealjmudejwl83p3p29bxi9.oast.fun
```
the reponse 200 ok
and the request wait 10 ms for finished
## Impact
## Summary:
unhanticated Rce via command line with sleep break the server until finish the request
Actions
View on HackerOneReport Stats
- Report ID: 3584149
- State: Closed
- Substate: not-applicable